Факультет електроніки та інформаційних технологій (ЕлІТ)
Permanent URI for this communityhttps://devessuir.sumdu.edu.ua/handle/123456789/20
Browse
3 results
Search Results
Item Mathematical Model for Adaptive Technology in E-learning Systems(MECS Press, 2022) Барченко, Наталія Леонідівна; Барченко, Наталья Леонидовна; Barchenko, Nataliia Leonidivna; Толбатов, Володимир Аронович; Толбатов, Владимир Аронович; Tolbatov, Volodymyr Aronovych; Лаврик, Тетяна Володимирівна; Лаврик, Татьяна Владимировна; Lavryk, Tetiana Volodymyrivna; Ободяк, Віктор Корнелійович; Ободяк, Виктор Корнелиевич; Obodiak, Viktor Korneliiovych; Шелехов, Ігор Володимирович; Шелехов, Игорь Владимирович; Shelekhov, Ihor Volodymyrovych; Толбатов, Андрій Володимирович; Толбатов, Андрей Владимирович; Tolbatov, Andrii Volodymyrovych; Gnatyuk, S.; Tolbatova, O.The emergence of a large number of e-learning platforms and courses does not solve the problem of improving the quality of education. This is primarily due to insufficient implementation or lack of mechanisms for adaptation to the individual parameters of the student. The level of adaptation in modern e-learning systems to the individual characteristics of the student makes the organization of human-computer interaction relevant. As the solution of the problem, a mathematical model of the organization of human-computer interaction was proposed in this work. It is based on the principle of two-level adaptation that determines the choice of the most comfortable module for studying at the first level. The formation of an individual learning path is performed at the second level. The problem of choosing an e-module is solved using a fuzzy logic. The problem of forming a learning path is reduced to the problem of linear programming. The input data are the characteristics of the quality of student activity in the education system. Based on the proposed model the computer technology to support student activities in modular e-learning systems is developed. This technology allows increasing the level of student’s cognitive comfort and optimizing the learning time. The most important benefit of the proposed approach is to increase the average score and increase student satisfaction with learning.Item Нечітка ієрархічна оцінка якості комплексних систем захисту інформації(Національний аерокосмічний університет "Харківський авіаційний інститут", 2020) Шелехов, Ігор Володимирович; Шелехов, Игорь Владимирович; Shelekhov, Ihor Volodymyrovych; Барченко, Наталія Леонідівна; Барченко, Наталья Леонидовна; Barchenko, Nataliia Leonidivna; Кальченко, Вадим Володимирович; Кальченко, Вадим Владимирович; Kalchenko, Vadym Volodymyrovych; Ободяк, Віктор Корнелійович; Ободяк, Виктор Корнелиевич; Obodiak, Viktor KorneliiovychChanges in the legislation of Ukraine lead to a gradual transition to international standards in the field of ensuring the protection of information in information and communication systems of government authorities. However, the latest regulatory framework is based on the regulatory documents of the past. In this regard, it became necessary to develop new approaches to assessing the security of information and communication systems. One of the options for solving this problem is the use of penetration testing methods. During this procedure, the parameters of the complex protection tools are tested using publicly available tools used by cybercriminals. After completing this procedure, three options for the results are possible, which are described by fuzzy terms: the system meets the requirements of regulatory documents, the system does not comply with the requirements of regulatory documents, the system partially meets the requirements of regulatory documents and needs to be improved. As a result, the problem arises of developing a model that allows obtaining an integral indicator of security based on a fuzzy knowledge base. The article analyzes international documents in the field of cybersecurity and normative documentation of the system of technical protection of information in Ukraine. As the criteria for evaluating the system, the criteria of security against unauthorized access were selected, which in turn are defined in the existing national regulatory documents. A model of a fuzzy hierarchical system for assessing the security profile has been developed, which sets a set of assessment criteria and the sequence of their use. The proposed hierarchical model makes it possible to present the assessment process in an explicit form and implement the process of checking the criteria, indicating the degree of confidence of the expert in the relevance of the assessment criteria. The system was implemented in the Fuzzy Logic Toolbox environment of the Matlab application package. Computer experiments have shown the possibility of applying the developed model in practice.Item Використання інтелектуальних систем для голосового керування комп’ютером(Сумський державний університет, 2013) Довбиш, Анатолій Степанович; Довбыш, Анатолий Степанович; Dovbysh, Anatolii Stepanovych; Нонко, Д.Ю.; Ободяк, Віктор Корнелійович; Ободяк, Виктор Корнелиевич; Obodiak, Viktor Korneliiovych; Шелехов, Ігор Володимирович; Шелехов, Игорь Владимирович; Shelekhov, Ihor VolodymyrovychПроблема доступності комп’ютерних технологій для користувачів з обмеженнями зору останній час набуває все більшої актуальності. Це обумовлено збільшенням навантаження на зоровий апарат в сучасному світі і, як наслідок, підвищення числа людей з такими вадами здоров’я. При цитуванні документа, використовуйте посилання http://essuir.sumdu.edu.ua/handle/123456789/31749